Fortinet patches critical zero-day vulnerability under active attack

April 10, 20262 min read1 sources
Share:
Fortinet patches critical zero-day vulnerability under active attack

Fortinet has released an emergency security update to address a critical vulnerability in its FortiClient Enterprise Management Server (EMS) that is being actively exploited in the wild. The flaw, identified as CVE-2023-35616, is an authentication bypass that allows an unauthenticated attacker to achieve remote code execution on vulnerable servers.

The vulnerability carries a CVSS score of 9.8 out of 10, reflecting its maximum severity. According to Fortinet's advisory, the flaw exists in a specific API endpoint, enabling an attacker to bypass authentication and execute arbitrary code with high privileges. The attack can be launched remotely over a network and requires no user interaction. Affected versions include FortiClient EMS 7.2.0 through 7.2.2 and 7.0.1 through 7.0.7.

The impact of a successful exploit is severe. FortiClient EMS is a centralized management platform used to deploy and control endpoint security software across an organization’s entire network. By compromising the EMS server, an attacker could gain a powerful foothold to deploy ransomware, exfiltrate sensitive data, or pivot to other critical systems. Organizations with publicly exposed EMS instances face the most immediate risk of attack.

This incident is the latest in a series of high-severity vulnerabilities discovered in Fortinet products that have been quickly weaponized by threat actors. The company strongly urges all customers using affected versions to update immediately to the patched releases, which are FortiClient EMS 7.2.3 and 7.0.8 or later. Due to the confirmed in-the-wild exploitation, administrators should prioritize applying the patch and are advised to review server logs for any signs of compromise or unusual API requests.

Share:

// SOURCES

// RELATED

Most 'AI SOCs' are just faster triage, and that's not enough

Many AI security tools only speed up alert analysis, failing to reduce analyst workload. Experts argue real gains require AI that automates response a

2 min readApr 17

ZionSiphon malware designed to sabotage water treatment systems

A new proof-of-concept malware, ZionSiphon, demonstrates how attackers can sabotage water treatment plants by manipulating industrial control systems.

2 min readApr 17

ThreatsDay bulletin: A deep dive into the Defender 0-day, SonicWall attacks, and a 17-year-old Excel flaw

This week’s threat bulletin is a heavy one. We analyze the critical Microsoft Defender 0-day, a massive SonicWall brute-force campaign, and a 17-year-

6 min readApr 17

Microsoft Defender's 'RedSun' zero-day: A researcher's protest and a threat to Windows systems

A researcher's protest exposed a critical zero-day in Microsoft Defender, allowing attackers full system control. Here's the technical breakdown and h

7 min readApr 17